Cybercriminals are sending destructive one-way links to hundreds of countless numbers of end users by way of Google Push notifications.
Scammers are leveraging a legitimate Google Push collaboration feature to trick buyers into clicking on malicious back links.
According to stories,, the the latest attack stems from Google Drive’s authentic collaboration aspect, which allows buyers to generate push notifications or e-mail that invite men and women to share a Google doc. Attackers are abusing this attribute to send out mobile people Google Push notifications that invite them to collaborate on paperwork, which then include destructive links.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Simply because they are sent by way of Google Drive, the notifications come from Google’s no-reply email address, making them seem additional legitimate. Other iterations of the attack are despatched via email (rather of by notification) and incorporate the destructive link appropriate in the email.
“Interesting TTP utilising Google Sheets, finally ending up with generic prize cons,” explained a cybersecurity expert who goes by Jake (or @JCyberSec) on Twitter. “Google sheets slide was shared with an email deal with leading to a pop-up notification on cellular.”
Intriguing TTP utilising Google Sheets, in the end ending up with generic prize scams🎁
Google sheets slide was shared with an email tackle leading to a pop-up notification on mobile.
Url sales opportunities to 🌐https://clck[.ru/RWen6 pic.twitter.com/RZPQNxuV0Y
— Jake (@JCyberSec_) October 21, 2020
The attack is targeting hundreds of thousands of Google users, according to WIRED. The report said that the notifications are being sent in Russian or broken English.
The Google Drive notifications come with various lures. Many purport to be “personal notifications” from Google Drive, with one lure entitled “Personal Notification No 8482” telling the victim they haven’t signed into their account in awhile. These threaten that the account will be deleted in 24 hours unless they sign in via a (malicious) link. Another, entitled “Personal Notification No 0684,” tells users they have an “important notice” of a financial transaction that they can view on their personal account, via a link.
One purports to be a run-of-the-mill prize scam that pretends to be part of a “Chrome Search contest 2020” and tells victims that they are the 5-billionth search and have won a prize.
These links take victims to malicious scam websites. WIRED reported that one such website flooded users with notifications to click on links for “prize draws,” while other websites requested that victims click on links to “check their bank account.”
Targeted users took to Twitter to warn of the scams, with one Twitter user saying that the only red flag of the scam was that he wasn’t expecting a shared doc.
I’ve received a few of these emails in the last two weeks. It’s a serious breach because the Google Drive/Docs notifications actually come from Google’s no-reply email address.
I knew the notifications were scams because I wasn’t expecting any shared doc. Be careful guys. https://t.co/qKppMASZcg
— Abubakar Idris (@IAtalkspace) November 1, 2020
A Google spokesperson told WIRED that the company is working on new security measures for detecting Google Drive spam. Threatpost has reached out to Google for further comment.
With the prevalence of working from home due to the coronavirus pandemic, attackers are increasingly leveraging collaboration and remote-work tools, including Google offerings. In May, researchers warned of a series of phishing campaigns using Google Firebase storage URLs. These used the reputation of Google’s cloud infrastructure to dupe victims and skate by secure email gateways. Meanwhile, researchers in October warned of a phishing campaign that pretends to be an automated message from Microsoft Teams. In reality, the attack stole Office 365 recipients’ login credentials.
“This scam wave highlights the need for users to be on the lookout for email-borne attacks,” according to Tripwire researchers. “Organizations can help their users in this regard by educating them about some of the most common types of phishing attacks that are in circulation today.”
Hackers Put Bullseye on Healthcare: On Nov. 18 at 2 p.m. EDT find out why hospitals are getting hammered by ransomware attacks in 2020. Save your spot for this FREE webinar on healthcare cybersecurity priorities and hear from leading security voices on how data security, ransomware and patching need to be a priority for every sector, and why. Join us Wed., Nov. 18, 2-3 p.m. EDT for this LIVE, limited-engagement webinar.
Some areas of this posting are sourced from:
threatpost.com